public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: "Peter Müller" <peter.mueller@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] openvpn: Update to version 2.5.4
Date: Wed, 17 Nov 2021 20:12:37 +0000	[thread overview]
Message-ID: <cb031822-c4c4-9991-826b-18430eb4e33d@ipfire.org> (raw)
In-Reply-To: <20211110110929.2489-1-adolf.belka@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 8620 bytes --]

Reviewed-by: Peter Müller <peter.mueller(a)ipfire.org>

> - Update from 2.5.0 to 2.5.4
> - Update rootfile
> - Tested new version in vm testbed. Openvpn server successfully started.
>     Client connections working with 2.5.0 also successfully worked with 2.5.4
> - Changelog
>     Overview of changes in 2.5.4
>      Bugfixes
>       - fix prompting for password on windows console if stderr redirection
>         is in use - this breaks 2.5.x on Win11/ARM, and might also break
>         on Win11/adm64 when released.
>       - fix setting MAC address on TAP adapters (--lladdr) to use sitnl
>         (was overlooked, and still used "ifconfig" calls)
>       - various improvements for man page building (rst2man/rst2html etc)
>       - minor bugfix with IN6_IS_ADDR_UNSPECIFIED() use (breaks build on
>         at least one platform strictly checking this)
>       - fix minor memory leak under certain conditions in add_route() and
>         add_route_ipv6()
>      User-visible Changes
>       - documentation improvements
>       - copyright updates where needed
>       - better error reporting when win32 console access fails
>      New features
>       - also build man page on Windows builds
>     Overview of changes in 2.5.3
>      Bugfixes
>       - CVE-2121-3606
>         see https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
>         OpenVPN windows builds could possibly load OpenSSL Config files from
>         world writeable locations, thus posing a security risk to OpenVPN.
>         As a fix, disable OpenSSL config loading completely on Windows.
>       - disable connect-retry backoff for p2p (--secret) instances
>         (Trac #1010, #1384)
>       - fix build with mbedtls w/o SSL renegotiation support
>       - Fix SIGSEGV (NULL deref) receiving push "echo" (Trac #1409)
>       - MSI installers: properly schedule reboot in the end of installation
>       - fix small memory leak in free_key_ctx for auth_token
>      User-visible Changes
>       - update copyright messages in files and --version output
>      New features
>       - add --auth-token-user option (for --auth-token deployments without
>         --auth-user-pass in client config)
>       - improve MSVC building for Windows
>       - official MSI installers will now contain arm64 drivers and binaries
>         (x86, amd64, arm64)
>     Overview of changes in 2.5.2
>      Bugfixes
>       - CVE-2020-15078
>         see https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
>         This bug allows - under very specific circumstances - to trick a
>         server using delayed authentication (plugin or management) into
>         returning a PUSH_REPLY before the AUTH_FAILED message, which can
>         possibly be used to gather information about a VPN setup.
>         In combination with "--auth-gen-token" or an user-specific token auth
>         solution it can be possible to get access to a VPN with an
>         otherwise-invalid account.
>       - restore pushed "ping" settings correctly on a SIGUSR1 restart
>       - avoid generating unecessary mbed debug messages - this is actually
>         a workaround for an mbedTLS 2.25 bug when using Curve25519 and Curve448
>         ED curves - mbedTLS crashes on preparing debug infos that we do not
>         actually need unless running with "--verb 8"
>       - do not print inlined (<dh>...</dh>) Diffie Hellman parameters to log file
>       - fix Linux/SITNL default route lookup in case of multiple routing tables
>         with more than one default route present (always use "main table" for now)
>       - Fix CRL file handling in combination with chroot
>      User-visible Changes
>       - OpenVPN will now refuse to start if CRL file is not present at startup
>         time.  At "reload time" absense of the CRL file is still OK (and the
>         in memory copy is used) but at startup it is now considered an error.
>      New features
>       - printing of the TLS ciphers negotiated has been extended, especially
>         displaying TLS 1.3 and EC certificates more correctly.
>     Overview of changes in 2.5.1
>      New features
>       - "echo msg" support, to enable the server to pushed messages that are
>         then displayed by the client-side GUI.  See doc/gui-notes.txt and
>         doc/management-notes.txt.
>         Supported by the Windows GUI shipped in 2.5.1, not yet supported by
>         Tunnelblick and the Android GUI.
>      User-visible Changes
>       - make OPENVPN_PLUGIN_ENABLE_PF plugin failures FATAL - if a plugin offers
>         to set the "openvpn packet filter", and returns a failure when requested
>         to, OpenVPN 2.5.0 would crash trying to clean up not-yet-initialized
>         structure members.  Since PF is going away in 2.6.0, this is just turning
>         the crash into a well-defined program abort, and no further effort has
>         been spent in rewriting the PF plugin error handling (see trac #1377).
>      Documentation
>       - rework sample-plugins/defer/simple.c - this is an extensive rewrite
>         of the plugin to bring code quality to acceptable standards and add
>         documentation on the various plugin API aspects.  Since it's just
>         example code, filed under "Documentation", not under "Bugfix".
>       - various man page improvements.
>       - clarify ``--block-ipv6`` intent and direction
>      Bugfixes
>       - fix installation of openvpn.8 manpage on systems without docutils.
>       - Windows: fix DNS search list setup for domains with "-" chars.
>       - Fix tls-auth mismatch OCC message when tls-cryptv2 is used.
>       - Windows: Skip DHCP renew with Wintun adapter (Wintun does not support
>         DHCP, so this was just causing an - harmless - error and needless delay).
>       - Windows: Remove 1 second delay before running netsh - speeds up
>         interface init for wintun setups not using the interactive service.
>       - Windows: Fix too early argv freeing when registering DNS - this would
>         cause a client side crash on Windows if ``register-dns`` is used,
>         and the interactive service is not used.
>       - Android: Zero initialise msghdr prior to calling sendmesg.
>       - Fix line number reporting on config file errors after <inline> segments
>         (see Trac #1325).
>       - Fix port-share option with TLS-Crypt v2.
>       - tls-crypt-v2: also preload tls-crypt-v2 keys (if --persist-key), otherwise
>         dropping privs on the server would fail.
>       - tls-crypt-v2: fix server memory leak (about 600 bytes per connecting
>         client with tls-crypt-v2)
>       - rework handling of server-pushed ``--auth-token`` in combination with
>         ``--auth-nocache`` on reconnection / TLS renegotiation events.  This
>         used to "forget" to update new incoming token after a reconnection event
>         (leading to failure to reauth some time later) and now works in all
>         tested cases.
> 
> Tested-by: Adolf Belka <adolf.belka(a)ipfire.org>
> Signed-off-by: Adolf Belka <adolf.belka(a)ipfire.org>
> ---
>   config/rootfiles/common/openvpn | 5 +++++
>   lfs/openvpn                     | 4 ++--
>   2 files changed, 7 insertions(+), 2 deletions(-)
> 
> diff --git a/config/rootfiles/common/openvpn b/config/rootfiles/common/openvpn
> index 41ccc885e..6c3457d01 100644
> --- a/config/rootfiles/common/openvpn
> +++ b/config/rootfiles/common/openvpn
> @@ -18,7 +18,12 @@ usr/sbin/openvpn
>   #usr/share/doc/openvpn/README.auth-pam
>   #usr/share/doc/openvpn/README.down-root
>   #usr/share/doc/openvpn/README.mbedtls
> +#usr/share/doc/openvpn/gui-notes.txt
>   #usr/share/doc/openvpn/management-notes.txt
> +#usr/share/doc/openvpn/openvpn-examples.5.html
> +#usr/share/doc/openvpn/openvpn.8.html
> +#usr/share/man/man5/openvpn-examples.5
> +#usr/share/man/man8/openvpn.8
>   var/ipfire/ovpn/ca
>   var/ipfire/ovpn/caconfig
>   var/ipfire/ovpn/ccd
> diff --git a/lfs/openvpn b/lfs/openvpn
> index 81ccc52bf..82e819bfe 100644
> --- a/lfs/openvpn
> +++ b/lfs/openvpn
> @@ -24,7 +24,7 @@
>   
>   include Config
>   
> -VER        = 2.5.0
> +VER        = 2.5.4
>   
>   THISAPP    = openvpn-$(VER)
>   DL_FILE    = $(THISAPP).tar.xz
> @@ -40,7 +40,7 @@ objects = $(DL_FILE)
>   
>   $(DL_FILE) = $(DL_FROM)/$(DL_FILE)
>   
> -$(DL_FILE)_MD5 = ba426e2217833b522810d6c06f7cc8f7
> +$(DL_FILE)_MD5 = 336be3b2388cdc65dd8c81f22b1c2836
>   
>   install : $(TARGET)
>   
> 

      parent reply	other threads:[~2021-11-17 20:12 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-10 11:09 Adolf Belka
2021-11-10 14:59 ` Michael Tremer
2021-11-17 20:12 ` Peter Müller [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=cb031822-c4c4-9991-826b-18430eb4e33d@ipfire.org \
    --to=peter.mueller@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox